Privilege escalation method and system in Unix-like environment of windows system

An environment and window technology, applied in the field of account management, can solve the problems that Sudowin cannot provide the function of switching accounts, program output results cannot be displayed, and path resolution is not correct.

Active Publication Date: 2013-10-30
SHENZHEN TENCENT COMP SYST CO LTD
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example: if the privilege escalation operation is carried out by the command that comes with Cygwin, there will be at least two problems: the path resolution is incorrect (the path format of Cygwin is similar to the path of Linux); the output of the program cannot be displayed in the reborn shell of Cgywin (BASH, GNU Bourne-Again SHell) above
[0008] (2) When Sudowin performs sudo operations, the account needs to be logged into the system, otherwise it cannot be executed. This is different from the current low-privilege real-name account login and switching to the operation and maintenance account with general permissions (for security protection, the operation and maintenance account cannot Network login) There is a big conflict in the process of using sudo operation
[0009] (3) In the operation and maintenance work, it is necessary to switch the real-name account to the operation and maintenance account before performing the operation and maintenance work, but Sudowin cannot provide the function of switching accounts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privilege escalation method and system in Unix-like environment of windows system
  • Privilege escalation method and system in Unix-like environment of windows system
  • Privilege escalation method and system in Unix-like environment of windows system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0025] At the initial stage of machine deployment of Windows system, all operation and maintenance accounts can be added to the Administrators group through scripts.

[0026] figure 1 It is a flowchart of a method for escalating rights in a Unix-like environment of a windows system according to an embodiment of the present invention.

[0027] Such as figure 1 As shown, the method includes:

[0028] Step 101: Add the operation and maintenance account to the administrator (administrator) group.

[0029] Step 102: Receive the privilege escalation operation request, parse the operation and maintenance account and the privilege escalation operation command in the Unix-like format from the privilege escalation operation request, and convert the privilege escalation o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a privilege escalation method and system in a Unix-like environment of a windows system. The privilege escalation method comprises adding an operation and maintenance account into an administrator group; receiving an operation request of privilege escalation, analyzing out the operation and maintenance account and an operation command of privilege escalation of a Unix-like format from the operation request of privilege escalation, and converting the operation command of privilege escalation of the Unix-like format into an operation command of privilege escalation of a windows format; applying the operation and maintenance account and creating sub-processes through an API (application program interface) which allows a user to use an assigned user account for creating processes to execute the operation command of privilege escalation of the windows format. According to the privilege escalation method and system in the Unix-like environment of the windows system, the function of command privilege escalation in the Unix-like environment can be achieved in the windows system, environments of Cygwin and cmd in the windows system are compatible and supported, and path analyses of Cygwin and redirecting of output results are supported.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of account management, and more specifically, relate to a method and system for escalating rights in a Unix-like environment of a windows system. Background technique [0002] Along with the continuous upgrade of computer hardware and software systems, Microsoft's Windows (windows) operating system is also constantly upgraded, from 16-bit, 32-bit to 64-bit operating system. From the original windowsl.0 to the well-known windows95, NT, 97, 98, 2000, Me, XP, Server, Vista, Windows 7 and other versions of continuous updates. [0003] Unix-like systems refer to various traditional Unix systems (such as FreeBSD, OpenBSD, Solaris of Sun Corporation) and various systems similar to traditional Unix (such as Minix, Linux, QNX, etc.). Although some of them are free software and some are commercial software, they all inherit the characteristics of the original Unix to a considerable extent, h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44
Inventor 高毅关义春黄岸平龙凡刘育军甘祥熊思敏张博
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products